Search alternatives:
making algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
models using » model using (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
Showing 561 - 580 results of 735 for search '(((( complement rd algorithm ) OR ( elements making algorithm ))) OR ( models using algorithm ))', query time: 0.12s Refine Results
  1. 561

    Could Petrol Stations Play a Key Role in Transportation Electrification? A GIS-Based Coverage Maximization of Fast EV Chargers in Urban Environment by Safak Bayram (16925975)

    Published 2022
    “…The spatial optimization problem is solved using a linear-programming relaxation based MCLP algorithm developed in Python. …”
  2. 562

    Economic Production Lot-Sizing For An Unreliable Machine Under Imperfect Age-Based Maintenance Policy by El-Ferik, S

    Published 2020
    “…Numerical results are provided to illustrate both the use of the algorithm in the study of the optimal cost function and the latter's sensitivity to different changes in cost factors. …”
    Get full text
    article
  3. 563

    A Novel Deep Learning Technique for Detecting Emotional Impact in Online Education by Abu Zitar, Raed

    Published 2022
    “…As part of this work, two deep learning models are compared according to their performance. …”
    Get full text
  4. 564

    On sensor selection in mobile devices based on energy, application accuracy, and context metrics by Taleb, Sireen

    Published 2013
    “…We use this algorithm to build a sensor selection model to choose among location sensors. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 565

    A novel network-based SIS framework for improved GA performance by Tohme, Rawane

    Published 2025
    “…Genetic algorithms have long been used to solve complex optimization problems by mimicking natural selection processes. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  6. 566
  7. 567

    Computation of conformal invariants by Mohamed M.S. Nasser (16931772)

    Published 2021
    “…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
  8. 568

    A Closed Queueing Networks Approach for an Optimal Heterogeneous Fleet Size of an Inter-Facility Bulk Material Transfer System by Mohamed Amjath (17542512)

    Published 2024
    “…Validation is conducted using a discrete event simulation (DES) model. Results: The proposed analytical model tested within a steel manufacturing plant’s material transfer process. …”
  9. 569

    A combinatorial auction‐based approach for ridesharing in a student transportation system by Chefi Triki (14158860)

    Published 2023
    “…The concept of ridesharing is used and the mechanism of combinatorial auctions is incorporated within a routing-based model. …”
  10. 570

    Optimization metaheuristic for software testing by Mansour, Nashat

    Published 2013
    “…We formulate the web application testing problem as an optimization problem and use a simulated annealing (SA) metaheuristic algorithm to generate test cases as sequences of events while keeping the test suite size reasonable. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 571
  12. 572

    Applications of artificial intelligence in emergency and critical care diagnostics: a systematic review and meta-analysis by Jithin Kalathikudiyil Sreedharan (18268894)

    Published 2024
    “…<h3>Introduction</h3><p dir="ltr">Artificial intelligence has come to be the highlight in almost all fields of science. It uses various models and algorithms to detect patterns and specific findings to diagnose a disease with utmost accuracy. …”
  13. 573

    Blockchain-Based Decentralized Architecture for Software Version Control by Muhammad Hammad (17541570)

    Published 2023
    “…The suggested model is implemented using the Hyperledger Fabric network, and the developer and authorizer ends are built into the dotnet web application.…”
  14. 574
  15. 575
  16. 576

    Generation and Detection of Sign Language Deepfakes - A Linguistic and Visual Analysis by Naeem, Shahzeb

    Published 2025
    “…We construct a reliable deepfake dataset, evaluating its technical and visual credibility using computer vision and natural language processing models. …”
    Get full text
    article
  17. 577

    Degree-Based Network Anonymization by Halawi, Ola

    Published 2020
    “…In this thesis, we study a new multi- objective parameterized anonymization approach that generalizes the known degree anonymization problem and attempts at improving it as a more realistic model for data security/privacy. Our model suggests a convenient privacy level for each net- work based on the standard deviation of its degrees. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  18. 578

    A simple approach for testing web service based applications by Tarhini, Abbas

    Published 2005
    “…Test cases are executed automatically using a test execution algorithm and a test framework is also presented. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 579

    A new minimum curvator multi-step method for unconstrained optimization by Obeid, Samir

    Published 1998
    “…In this paper, we carry on with a similar idea and define a rational model with a free parameter. Our derivation of the new algorithm is based on determining some value of the parameter that minimizes the curvature in some chosen metric. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 580

    Process Mining over Unordered Event Streams by Awad, Ahmed

    Published 2020
    “…Using directly-follows graphs as a basic model for many process mining tasks, we provide two approaches to handle such unorderedness, either through buffering or speculative processing. …”
    Get full text
    Get full text
    Get full text